OMB No. 1651-0077
Expiration Date: 9-30-2016
TRUSTED TRADER Application(Security and Trade Compliance) |
|||||
Applicant Information |
|||||
Company Name: |
|||||
Company doing business as: |
|||||
Company Website: |
|||||
Physical Address: |
|||||
City |
State/Zip Code |
||||
Point of Contact: |
Title: |
||||
Phone Number: |
Email: |
||||
Importer of Record Number(s): |
|||||
OTHER:
|
|||||
additional contacts
|
|||||
C-TPAT |
Name/email: |
Phone |
|||
ISA |
Name/email: |
Phone |
|||
Business Information |
|||||
Business type: |
CBP Bond Number: |
||||
Business Start Date: |
Number of Employees: |
||||
Briefly describe organizational structure of your supply chain security and trade compliance departments:
|
|||||
Brief Company History: |
|||||
Signature |
|||||
I attest to the accuracy and correctness of the information provided in this application package. |
|||||
Name of Company Official: |
|||||
Signature of Company Official |
Date: |
Paperwork Reduction Act Statement: An agency may not conduct or sponsor an information collection and a person is not required to respond to this information unless it displays a current valid OMB control number and an expiration date. The control number for this collection is 1651-0077. The estimated average time to complete this application is 2 hours. The obligation to respond is required to obtain a benefit. If you have any comments regarding the burden estimate you can write to U.S. Customs and Border Protection Office of Regulations and Rulings, 90 K Street, NE, 10th Floor, Washington DC 20229.
NOTICE: This system contains trade secrets and commercial and financial information relating to the confidential business of private parties. The Trade Secrets Act, (18 U.S.C. 1905), provides penalties for disclosure of such information. CBP employees who violate this Act and make wrongful disclosures of confidential commercial information may subject to a personal fine of up to $1000, imprisonment for not more than one year, or both, and shall be removed from employment. An improper disclosure of certain information contained in this system would constitute a violation of the Privacy Act (5 U.S.C. 552A). Violators could be subject to a fine of not more than $5000. Information contained in this system is subject to 3rd party rule and may not be disclosed to other government agencies without express permission of the agency supplying original information.
Supply Chain Security Profile (Use C-TPAT Portal) |
||||
Operating Procedures |
Yes |
No |
Document Uploaded |
Comments |
Importers must have written and verifiable process for the selection of business partners including Mfg., suppliers, vendors |
|
|
|
|
Importers must ensure that business partners develop security processes and procedures consistent with the C-TPAT security criteria |
|
|
|
|
Business partners who have obtained a certification in a supply chain security program should be required to indicate/provide status of participation |
|
|
|
|
Internal requirement, such as financial soundness, capability of meeting contractual security requirements, and the ability to identify/correct deficiencies |
|
|
|
|
At point of stuffing, procedures must be in place to properly seal and maintain the integrity of the shipping containers. A high security seal must be affixed to all loaded containers bound for the U.S. All seals must meet or exceed the current PAS ISO 17712 standards for high security seals. |
|
|
|
|
Procedures must be in place to verify the physical integrity of the container structure prior to stuffing, to include the reliability of the locking mechanisms of the doors. A seven-point inspection process is recommended for all containers: Front wall, Left side, Right side, Floor, Ceiling/Roof, Inside/outside doors, Outside/Undercarriage. |
|
|
|
|
Written procedures must stipulate how seals are to be controlled and affixed to loaded containers - to include procedures for recognizing and reporting compromised seals and/or containers to CBP or the appropriate foreign authority. |
|
|
|
|
Containers must be stored in a secure area to prevent unauthorized access and/or manipulation. |
|
|
|
|
An employee identification system must be in place for positive identification and access control purposes. Employees should only be given access to those secure areas needed for the performance of their duties. Company management or security personnel must adequately control the issuance and removal of employee, visitor and vendor identification badges. |
|
|
|
|
Visitors must present photo identification for documentation purposes upon arrival. All visitors should be escorted and visibly display temporary identification.
|
|
|
|
|
Access controls must include the positive identification of all employees, visitors, and vendors at all points of entry. Access controls prevent unauthorized entry to facilities, maintain control of employees and visitors, and protect company assets. |
|
|
|
|
Proper vendor ID and/or photo identification must be presented for documentation purposes upon arrival by all vendors.
|
|
|
|
|
Procedures must be in place to identify, challenge and address unauthorized/unidentified persons. |
|
|
|
|
Processes must be in place to screen prospective employees and to periodically check current employees. |
|
|
|
|
Application information, such as employment history and references must be verified prior to employment. |
|
|
|
|
Consistent with foreign, federal, state, and local regulations, background checks and investigations should be conducted for prospective employees. Once employed, periodic checks and reinvestigations should be performed based on cause, and/or the sensitivity of the employee’s position. |
|
|
|
|
Companies must have procedures in place to remove identification, facility, and system access for terminated employees. |
|
|
|
|
Procedures must be in place to ensure that all information used in the clearing of merchandise/cargo, is legible, complete, accurate, and protected against the exchange, loss or introduction of erroneous information. Documentation control must include safeguarding computer access and information. |
|
|
|
|
To help ensure the integrity of cargo received from abroad, procedures must be in place to ensure that information received from business partners is reported accurately and timely. |
|
|
|
|
Arriving cargo should be reconciled against information on the cargo manifest. The cargo should be accurately described, and the weights, labels, marks and piece count indicated and verified. Departing cargo should be verified against purchase or delivery orders. Drivers delivering or receiving cargo must be positively identified before cargo is received or released. |
|
|
|
|
Security measures must be in place to ensure the integrity and security of processes relevant to the transportation, handling, and storage of cargo in the supply chain.
|
|
|
|
|
All shortages, overages, and other significant discrepancies or anomalies must be resolved and/or investigated appropriately. Customs and/or other appropriate law enforcement agencies must be notified if illegal or suspicious activities are detected - as appropriate |
|
|
|
|
A threat awareness program should be established and maintained by security personnel to recognize and foster awareness of the threat posed by terrorists at each point in the supply chain.
|
|
|
|
|
Perimeter fencing should enclose the areas around cargo handling and storage facilities. Interior fencing within a cargo handling structure should be used to segregate domestic, international, high value, and hazardous cargo. All fencing must be regularly inspected for integrity and damage.
|
|
|
|
|
Gates through which vehicles and/or personnel enter or exit must be manned and/or monitored. The number of gates should be kept to the minimum necessary for proper access and safety. |
|
|
|
|
Private passenger vehicles should be prohibited from parking in or adjacent to cargo handling and storage areas. |
|
|
|
|
Buildings must be constructed of materials that resist unlawful entry. The integrity of structures must be maintained by periodic inspection and repair. |
|
|
|
|
Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Importers should incorporate the following C-TPAT physical security criteria throughout their supply chains as applicable. |
|
|
|
|
All external and internal windows, gates and fences must be secured with locking devices. Management or security personnel must control the issuance of all locks and keys. |
|
|
|
|
Adequate lighting must be provided inside and outside the facility including the following areas: entrances and exits, cargo handling and storage areas, fence lines and parking areas. |
|
|
|
|
Alarm systems and video surveillance cameras should be utilized to monitor premises and prevent unauthorized access to cargo handling and storage areas.
|
|
|
|
|
Automated systems must use individually assigned accounts that require a periodic change of password. IT security policies, procedures and standards must be in place and provided to employees in the form of training. |
|
|
|
|
A system must be in place to identify the abuse of IT including improper access, tampering or the altering of business data. All system violators must be subject to appropriate disciplinary actions for abuse. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Trade Compliance Profile |
||||
Operating Procedures |
Yes |
No |
Document Uploaded |
Comments |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
(check one or more of the applicable options below)
☐ Value ☐ Drawback ☐ Foreign Trade Zone ☐ Classification ☐ Country of Origin ☐ Free Trade Agreements ☐ AD/CVD ☐ Other ________________
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
(check one or more of the applicable options below)
☐ Brokers ☐ Suppliers ☐ Manufacturers ☐ Other _______________
|
|
|
|
|
(check one or more of the applicable options below)
☐ FDA ☐ Fish & Wildlife ☐ TSCA ☐ CPSC ☐ EPA ☐ USDA ☐ Not Applicable ☐ Other _______________
|
|
|
|
|
(check one or more of the applicable options below)
☐ FDA ☐ Fish & Wildlife ☐ TSCA ☐ CPSC ☐ EPA ☐ USDA ☐ Not Applicable ☐ Other _______________
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
File Type | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
File Title | Membership application form |
Author | Authorized User |
File Modified | 0000-00-00 |
File Created | 2021-01-23 |